Draft Special Publication 800-202 Guide Helps Digital Forensics Investigators Place Data on Mobile Devices NIST is releasing a guide that describes procedures for documenting and populating test data on a mobile device before testing a mobile forensic tool—the recovery and interpretation of data found on digital devices is often part of a criminal or civil…

Firmware is everywhere; from the largest data center to the smallest networked LED light bulb. It is the most powerful code on any system because it controls how devices operate. Compromised firmware can be used to corrupt or steal data, spy on your environment or even destroy the system it is controlling. Firmware is powerful code that…

JohnsTek, Inc. has been commissioned by the State of South Carolina to provide Information Security Services in the form of Vulnerability Management, Security Risk Assessments, Penetration Testing and other Consulting Services. To perform this work to the highest level of expertise in this field, JohnsTek Inc. has formed the JohnsTek Team, comprised of JohnsTek, Inc…